We realize that email contains our customers’ private data. This is why security and privacy are our top priority.

Sanebox is one of those cloud services that I really cannot do without. As a crusader for information security the last 15 years I'm very impressed with their approach to security and privacy.

Amar Singh
Globally recognised Information Security & GRC expert,
Former CISO, Current Chair of the UK's Security Advisory Group, ISACA.

Data security

Your emails never leave your server

SaneBox never takes possession of them, and only analyzes headers to determine what's important.

Your data is completely private

SaneBox algorithms analyze the patterns in your email behavior (which emails you open, which emails you respond to, how quickly, etc) to determine what’s important to you. We never look at the content of your emails.

Database lock d4fb97c1cf0bf013007a48911aa1353706f4496a89428ef2e11dc0a80aa4cb75

Your password is safe

SaneBox needs access to your Inbox, which means we need your password. However, your credentials are encrypted with proven public key cryptography, and placed on a server that's unreachable by public internet.

Active Directory integration

IT administrators can authenticate user account without ever exposing credentials via Active Directory on MS Exchange, Google Apps provisioning, or IBM Notes Delegation. In this case not only your email data, but even your login credentials never leave your server.

Network security

Network shield 0e523625796409cd2c8d40bb81c703085f5239c434cbcff1ef8acb424353db1f

Our mail processing servers never accept connections from the public Internet. All network access is provided through encrypted VPN tunnels via a bastion server. From there, our servers are accessed by our authenticated engineers via SSH, and all access is logged and audited. There are no exceptions.

Physical security

The data centers are housed in nondescript facilities away from major cities, and have extensive setbacks with military grade perimeter control. Authorized staff must pass through two-factor authentication systems, and are under video surveillance at all time.

Server shield 809af07c4381a9cca740f06d000ecc93e2d6b9a957154b61050d5a37d9ff3276

Personnel security

Each of our personnel is hand picked, fully vetted with internal methods. Only select senior engineering personnel are allowed to access our production servers, and access logs are kept at all times.

Member shield 898596bab602155333069ba43d228be37ac0cdbb52bc8584dab443b8556646c6